Appearance
2026-03-09
cs.AR - Architecture
| 标题 | 作者 | 发布日期 | 摘要 | |
|---|---|---|---|---|
| The Inequality: Quantifying the Double Penalty of Mixture-of-Experts at Inference | Vignesh Adhinarayanan, Nuwan Jayasena | 2026-03-09 | 下载 | Mixture-of-Experts (MoE) models deliver high quality at low training FLOPs, but this efficiency often vanishes at inference. We identify a double penalty that structurally disadvantages MoE architectu... |
| Multi-Agent Memory from a Computer Architecture Perspective: Visions and Challenges Ahead | Zhongming Yu, Naicheng Yu, Hejia Zhang, Wentao Ni, Mingrui Yin, Jiaying Yang, Yujie Zhao, Jishen Zhao | 2026-03-09 | 下载 | As LLM agents evolve into collaborative multi-agent systems, their memory requirements grow rapidly in complexity. This position paper frames multi-agent memory as a computer architecture problem. |
| bsort: A theoretically efficient non-comparison-based sorting algorithm for integer and floating-point numbers | Benjamín Guzmán | 2026-03-09 | 下载 | This paper presents bsort, a non-comparison-based sorting algorithm for signed and unsigned integers, and floating-point values. The algorithm unifies these cases through an approach derived from bina... |
| Trust Nothing: RTOS Security without Run-Time Software TCB (Extended Version) | Eric Ackermann, Sven Bugiel | 2026-03-09 | 下载 | Embedded devices face an ever-expanding threat landscape: vulnerabilities in application software, operating system kernels, and peripherals threaten the embedded device integrity. |
| Why Learn What Physics Already Knows? Realizing Agile mmWave-based Human Pose Estimation via Physics-Guided Preprocessing | Shuntian Zheng, Jiaqi Li, Minzhe Ni, Xiaoman Lu, Yu Guan | 2026-03-09 | 下载 | We revisit millimeter-wave (mmWave) human pose estimation (HPE) from a signal preprocessing perspective. A single mmWave frame provides structured dimensions that map directly to human geometry and mo... |
| GOMA: Geometrically Optimal Mapping via Analytical Modeling for Spatial Accelerators | Wulve Yang, Hailong Zou, Rui Zhou, Jionghao Zhang, Qiang Li, Gang Li, Yi Zhan, Shushan Qiao | 2026-03-09 | 下载 | General matrix multiplication (GEMM) on spatial accelerators is highly sensitive to mapping choices in both execution efficiency and energy consumption. |
| ConnChecker: Automated Root-Cause Analysis for Formal Connectivity Check via Graph | Do Ngoc Tiep, Nguyen Linh Anh, Luu Danh Minh | 2026-03-09 | 下载 | Formal connectivity checking offers scalable verification of signal paths in complex SoC designs, but debugging counterexamples remains a manual and time-consuming process. |
cs.DC - Distributed, Parallel, and Cluster Computing
| 标题 | 作者 | 发布日期 | 摘要 | |
|---|---|---|---|---|
| Lockbox -- A Zero Trust Architecture for Secure Processing of Sensitive Cloud Workloads | Vamshi Krishna Thotempudi, Mahima Agarwal, Raghav Batta, Anjali Mangal | 2026-03-09 | 下载 | Enterprises increasingly rely on cloud-based applications to process highly sensitive data artifacts. Although cloud adoption improves agility and scalability, it also introduces new security challeng... |
| The Inequality: Quantifying the Double Penalty of Mixture-of-Experts at Inference | Vignesh Adhinarayanan, Nuwan Jayasena | 2026-03-09 | 下载 | Mixture-of-Experts (MoE) models deliver high quality at low training FLOPs, but this efficiency often vanishes at inference. We identify a double penalty that structurally disadvantages MoE architectu... |
| A Consensus-Driven Multi-LLM Pipeline for Missing-Person Investigations | Joshua Castillo, Ravi Mukkamala | 2026-03-09 | 下载 | The first 72 hours of a missing-person investigation are critical for successful recovery. Guardian is an end-to-end system designed to support missing-child investigation and early search planning. |
| FedLECC: Cluster- and Loss-Guided Client Selection for Federated Learning under Non-IID Data | Daniel M. Jimenez-Gutierrez, Giovanni Giunta, Mehrdad Hassanzadeh, Aris Anagnostopoulos, Ioannis Chatzigiannakis, Andrea Vitaletti | 2026-03-09 | 下载 | Federated Learning (FL) enables distributed Artificial Intelligence (AI) across cloud-edge environments by allowing collaborative model training without centralizing data. |
| DeZent: Decentralized z-Anonymity with Privacy-Preserving Coordination | Carolin Brunn, Florian Tschorsch | 2026-03-09 | 下载 | Analyzing large volumes of sensor network data, such as electricity consumption measurements from smart meters, is essential for modern applications but raises significant privacy concerns. |
| Serving Compound Inference Systems on Datacenter GPUs | Sriram Devata, Rahul Singh, Sarita Adve | 2026-03-09 | 下载 | Applications in emerging domains such as XR are being built as compound inference systems, where multiple ML models are composed in the form of a task graph to service each request. |
| A Blockchain-based Traceability System for AI-Driven Engine Blade Inspection | Mahmoud Hafez, Eman Ouda, Mohammed A. Mohammed Eltoum, Khaled Salah, Yusra Abdulrahman | 2026-03-09 | 下载 | Aircraft engine blade maintenance relies on inspection records shared across manufacturers, airlines, maintenance organizations, and regulators. |
| TA-RNN-Medical-Hybrid: A Time-Aware and Interpretable Framework for Mortality Risk Prediction | Zahra Jafari, Azadeh Zamanifar, Amirfarhad Farhadi | 2026-03-09 | 下载 | Accurate and interpretable mortality risk prediction in intensive care units (ICUs) remains a critical challenge due to the irregular temporal structure of electronic health records (EHRs), the comple... |
| A Hodge-Based Framework for Service Operational Analysis in Serverless Platforms | Gianluca Reali, Mauro Femminella | 2026-03-09 | 下载 | In this paper we propose a method for analyzing services deployed in serverless platforms. These services typically consists of orchestrated functions that can exhibit complex and non-conservative inf... |
| Covenant-72B: Pre-Training a 72B LLM with Trustless Peers Over-the-Internet | Joel Lidin, Amir Sarfi, Erfan Miahi, Quentin Anthony, Shivam Chauhan, Evangelos Pappas, Benjamin Thérien, Eugene Belilovsky, Samuel Dare | 2026-03-09 | 下载 | Recently, there has been increased interest in globally distributed training, which has the promise to both reduce training costs and democratize participation in building large-scale foundation model... |
| SafarDB: FPGA-Accelerated Distributed Transactions via Replicated Data Types | Javad Saberlatibari, Prithviraj Yuvaraj, Mohsen Lesani, Philip Brisk, Mohammad Sadoghi | 2026-03-09 | 下载 | Data replication is a critical aspect of data center design, as it ensures high availability, scalability, and fault tolerance. However, replicas need to be coordinated to maintain convergence and dat... |
| SI-ChainFL: Shapley-Incentivized Secure Federated Learning for High-Speed Rail Data Sharing | Mingjie Zhao, Cheng Dai, Fei Chen, Xin Chen, Kaoru Ota, Mianxiong Dong, Bing Guo | 2026-03-09 | 下载 | In high-speed rail (HSR) systems, federated learning (FL) enables cross-departmental flow prediction without sharing raw data. However, existing schemes suffer from two key limitations: (1) insufficie... |
| ACE-GF-based Attestation Relay for PQC - Lightweight Mempool Propagation Without On-Path Proofs | Jian Sheng Wang | 2026-03-09 | 下载 | In post-quantum blockchain settings, objects that require validity proofs (e.g., blob roots, execution-layer or consensus-layer signature aggregates) must be broadcast through mempool and relay networ... |
| ZK-ACE: Identity-Centric Zero-Knowledge Authorization for Post-Quantum Blockchain Systems | Jian Sheng Wang | 2026-03-09 | 下载 | Post-quantum signature schemes introduce kilobyte-scale authorization artifacts when applied directly to blockchain transaction validation. A widely considered mitigation is to verify post-quantum sig... |
| RAPID: Redundancy-Aware and Compatibility-Optimal Edge-Cloud Partitioned Inference for Diverse VLA Models | Zihao Zheng, Sicheng Tian, Hangyu Cao, Chenyue Li, Jiayu Chen, Maoliang Li, Xinhao Sun, Hailong Zou, Guojie Luo, Xiang Chen | 2026-03-09 | 下载 | Vision Language Action (VLA) models are mainstream in embodied intelligence but face high inference costs. Edge-Cloud Collaborative (ECC) inference offers an effective fix by easing edge-device comput... |
| SageSched: Efficient LLM Scheduling Confronting Demand Uncertainty and Hybridity | Zhenghao Gan, Yichen Bao, Yifei Liu, Chen Chen, Quan Chen, Minyi Guo | 2026-03-09 | 下载 | Efficient LLM inference scheduling is crucial for user experience. However, LLM inferences exhibit remarkable demand uncertainty (with unknown output length beforehand) and hybridity (being both compu... |
| The Consistency Correctness in CoPPar Tree | Xincheng Yang, Kyle Hale | 2026-03-09 | 下载 | This article is a supplementary document for the CoPPar Tree paper, providing a detailed correctness proof for the CoPPar architecture. |
cs.NI - Networking and Internet Architecture
| 标题 | 作者 | 发布日期 | 摘要 | |
|---|---|---|---|---|
| Optimizing Reinforcement Learning Training over Digital Twin Enabled Multi-fidelity Networks | Hanzhi Yu, Hasan Farooq, Julien Forgeat, Shruti Bothe, Kristijonas Cyras, Md Moin Uddin Chowdhury, Mingzhe Chen | 2026-03-09 | 下载 | In this paper, we investigate a novel digital network twin (DNT) assisted deep learning (DL) model training framework. In particular, we consider a physical network where a base station (BS) uses seve... |
| Why Channel-Centric Models are not Enough to Predict End-to-End Performance in Private 5G: A Measurement Campaign and Case Study | Nils Jörgensen | 2026-03-09 | 下载 | Communication-aware robot planning requires accurate predictions of wireless network performance. Current approaches rely on channel-level metrics such as received signal strength and signal-to-noise ... |
| OAuthHub: Mitigating OAuth Data Overaccess through a Local Data Hub | Qiyu Li, Yuhe Tian, Haojian Jin | 2026-03-09 | 下载 | Most OAuth service providers, such as Google and Microsoft, offer only a limited range of coarse-grained data access. As a result, third-party OAuth applications often end up accessing more user data ... |
| Mobile Base Station Optimal Tour in Wide Area IoT Sensor Networks | Sachin Kadam | 2026-03-09 | 下载 | Wide-area IoT sensor networks require efficient data collection mechanisms when sensors are dispersed over large regions with limited communication infrastructure. |
| Predicting Conflict Impact on Performance in O-RAN | Pietro Brach del Prever, Niloofar Mohamadi, Salvatore D'Oro, Leonardo Bonati, Michele Polese, Łukasz Kułacz, Piotr Jaworski, Adrian Kliks, Heiko Lehmann, Tommaso Melodia | 2026-03-09 | 下载 | The O-RAN Alliance promotes the integration of intelligent autonomous agents to control the Radio Access Network (RAN). This improves flexibility, performance, and observability in the RAN, but introd... |
| Time-based Fairness Improves Performance in Multi-rate WLANs | Godfrey Tan, John Guttag | 2026-03-09 | 下载 | The performance seen by individual clients on a wireless local area network (WLAN) is heavily influenced by the manner in which wireless channel capacity is allocated. |
| Where Do Flow Semantics Reside? A Protocol-Native Tabular Pretraining Paradigm for Encrypted Traffic Classification | Sizhe Huang, Shujie Yang | 2026-03-09 | 下载 | Self-supervised masked modeling shows promise for encrypted traffic classification by masking and reconstructing raw bytes. Yet recent work reveals these methods fail to reduce reliance on labeled dat... |
| Silicone Ethernet (SEth): a Nervous System for Robotic Touch | Mengyao Liu, Dag Malstaf, Jonathan Oostvogels, Sam Michiels, Alexander Badri-Spröwitz, Danny Hughes | 2026-03-09 | 下载 | Fine-grained robotic touch sensing is essential for tasks such as robot-human interaction and the handling of hazardous materials. Yet, the sense of touch of robots is limited by the cost and complexi... |
| A Comparative Study of Recent Advances in Internet of Intrusion Detection Things | Marianna Rezk, Hassan Harb, Ismail Bennis, Sebastien Bindel, Hafid Abouaissa | 2026-03-09 | 下载 | The Internet of Things (IoT) has revolutionized the way devices communicate and interact with each other, but it has also created new challenges in terms of security. |
| A Hodge-Based Framework for Service Operational Analysis in Serverless Platforms | Gianluca Reali, Mauro Femminella | 2026-03-09 | 下载 | In this paper we propose a method for analyzing services deployed in serverless platforms. These services typically consists of orchestrated functions that can exhibit complex and non-conservative inf... |
| Not All Prefills Are Equal: PPD Disaggregation for Multi-turn LLM Serving | Zongze Li, Jingyu Liu, Zach Xu, Yineng Zhang, Tahseen Rabbani, Ce Zhang | 2026-03-09 | 下载 | Prefill-Decode (PD) disaggregation has become the standard architecture for modern LLM inference engines, which alleviates the interference of two distinctive workloads. |
| PreHO: Predictive Handover for LEO Satellite Networks | Xingqiu He, Zijie Ying, Chaoqun You, Yue Gao | 2026-03-09 | 下载 | Low-Earth Orbit (LEO) Satellite Networks (LSNs) offer a promising solution for extending connectivity to areas not covered by Terrestrial Networks (TNs). |
| Energy-Efficient Online Scheduling for Wireless Powered Mobile Edge Computing Networks | Xingqiu He, Chaoqun You, Yuzhi Yang, Zihan Chen, Yuhang Shen, Tony Q. S. Quek, Yue Gao | 2026-03-09 | 下载 | Wireless Powered Mobile Edge Computing (WP-MEC) integrates mobile edge computing (MEC) with wireless power transfer (WPT) to simultaneously extend the operational lifetime and enhance the computationa... |
| Hard/Soft NLoS Detection via Combinatorial Data Augmentation for 6G Positioning | Sang-Hyeok Kim, Seung Min Yu, Jihong Park, Seung-Woo Ko | 2026-03-09 | 下载 | A key enabler for meeting the stringent requirements of 6G positioning is the ability to exploit site-dependent information governing line-of-sight (LoS) and non-line-of-sight (NLoS) propagation. |
cs.OS - Operating Systems
| 标题 | 作者 | 发布日期 | 摘要 | |
|---|---|---|---|---|
| The Missing Memory Hierarchy: Demand Paging for LLM Context Windows | Tony Mason | 2026-03-09 | 下载 | The context window of a large language model is not memory. It is L1 cache: a small, fast, expensive resource that the field treats as the entire memory system. |
| Trust Nothing: RTOS Security without Run-Time Software TCB (Extended Version) | Eric Ackermann, Sven Bugiel | 2026-03-09 | 下载 | Embedded devices face an ever-expanding threat landscape: vulnerabilities in application software, operating system kernels, and peripherals threaten the embedded device integrity. |
cs.PF - Performance
| 标题 | 作者 | 发布日期 | 摘要 | |
|---|---|---|---|---|
| The Inequality: Quantifying the Double Penalty of Mixture-of-Experts at Inference | Vignesh Adhinarayanan, Nuwan Jayasena | 2026-03-09 | 下载 | Mixture-of-Experts (MoE) models deliver high quality at low training FLOPs, but this efficiency often vanishes at inference. We identify a double penalty that structurally disadvantages MoE architectu... |
| bsort: A theoretically efficient non-comparison-based sorting algorithm for integer and floating-point numbers | Benjamín Guzmán | 2026-03-09 | 下载 | This paper presents bsort, a non-comparison-based sorting algorithm for signed and unsigned integers, and floating-point values. The algorithm unifies these cases through an approach derived from bina... |
| DyLLM: Efficient Diffusion LLM Inference via Saliency-based Token Selection and Partial Attention | Younjoo Lee, Junghoo Lee, Seungkyun Dan, Jaiyoung Park, Jung Ho Ahn | 2026-03-09 | 下载 | Masked Diffusion Language Models (MDLMs) enable parallel token decoding, providing a promising alternative to the sequential nature of autoregressive generation. |